Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

There are two parts:

Part 1 (mark: 25% of the total assignment) - You are required to design and implement the ECC public key system using C or C++ or Java or any programming language you are familiar with.

Part 2 (mark: 15% of the total assignment) - You are required to apply your ECC system in three network services:

a.    apply your ECC system  in Telnet service, SSL and IPSec, or

b.    you can apply your ECC system in your own socket based service, and RPC based service and DCOM or CORBA service.

 Part 1: Design and implementation of an ECC public key system to provide encryption/decryption and digital signature sign and verification in C or C ++ or Java.  You can use Diffie-Hellman key exchange protocol and the underlying field Fp or other key exchange protocol and a Binary Field for your curve. 

 Your assignment is based on the following standard curve:

y^2 = x^3 + A*x + B mod p 

with domain parameters (for 160-Bit curves):  

p = E95E4A5F737059DC60DFC7AD95B3D8139515620F

A =   340E7BE2A280EB74E2BE61BADA745D97E8F7C300

B = 1E589A8595423412134FAA2DBDEC95C8D8675E58

x = BED5AF16EA3F6A4F62938C4631EB5AF7BDBCDBC3

y = 1667CB477A1A8EC338F94741669C976316DA6321

q = E95E4A5F737059DC60DF5991D45029409E60FC09

h = 1 

(See section Domain Parameters Specification of 

   http://tools.ietf.org/html/rfc5639 for the meaning of the parameters)

 You can work on the underlying field Zp, where p is a prime number and not less than 160 bits or Binary Field with the same population. You can also choose any hash function which is available as free source for the digital signature implementation. You do not have to implement a hash function and a random number generator. You will have to implement all other operations (you can use my sample java code as a guide).

To represent a message on an EC, you can use any free source code or write your own one if you wish to do so. If you cannot implement this part, then you can assume “a message is represented as an integer” for the pass mark. 

The Diffie-Hellman protocol is loosely described as follows (refer to the lecture for The Diffie-Hellman and ECC):

Let’s assume that Alice wants to encrypt and send a message to Bob and Bob wants 

to decrypt the encrypted message.

(Assume that we are working with (Zp, modulo) and p is a large prime number.)

a.       Alice chooses a random integer x and sends Bob   a = gx mod p

b.      Similarly Bob chooses a random integer y and sends Alice b = gy mod p

c.       Alice then computes k from b that Bob sent: k = bx mod p

d.      Similarly Bob then computes k’ = ay mod p

Both k and k’ are equal to gxy mod p. Alice or Bob can now use either k or k’ as their shared secret key.

Important note – What you can and What you cannot:

 You are only allowed to use the basic libraries of BigInteger and BigDecimal numbers and Hash functions (MD5, SHA-1, SHA-256, or SHA-512).

 You have to implement all operations: 

a.      addition, subtraction, multiplication of points on your ECC, 

b.      encryption, decryption, signing and verifying functions. 

hi,

I have this assignment below which should be hand on Wednesday. I'm beginner  in java so that so difficult for me. have a look to the assignment specification and I 'm waiting to hear from you. 

Assignment:   

You are not allowed to use any crypto library. If you borrow code from anywhere, you will get ZERO.

 Submission - Due date: Week 8, Friday 4pm (Use Assignment Box)

You have to submit a hard copy of your work with the standard assignment format and a soft copy on a CD/DVD (submission via email is not acceptable).

For Part 1: Your submission must include your source code and a report which include the following tasks: 

1. You have to list and explain the steps you follow to complete your work that includes the design and implementation considerations; any suggestions for code improvement; any security and efficiency improvements, etc.

2. You have to provide the logic of your programs in pseudo code. 

The pseudo code should be detailed enough so that the mapping between the pseudo code and the C or Java program is trivial. (Look up the Web for the information about pseudo code).

If you want to include an additional structure chart or flow chart, it is O.K. However, it does not replace the “logic of your programs in pseudo code”

3. You have to provide a user document and programmer document for your code (please look up the Web for the description of user and programmer documentation). 

4. You have to explain the security of your implementation. This is the most important part of your report.

This includes a discussion of the strength and weaknesses of your implementation, limitations and possible attacks on it.

 For part 2: 

 You must write a report to describe in detail how you apply your ECC system in the three network services and demonstrate your work to your tutor.

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91578081
  • Price:- $90

Guranteed 48 Hours Delivery, In Price:- $90

Have any Question?


Related Questions in Computer Engineering

Give an example of a merger or acquisition where technology

Give an example of a merger or acquisition where technology contributed to its failure to produce desired outcomes. What reasons caused the failure? What actions might have helped ensure success?

Whats the difference between a bigfile tablespace and a

What's the difference between a Bigfile tablespace and a Smallfile tablespace? Explain which you would use for your database and why.

Python programmingplease i would like some help in checking

Python programming Please I would like some help in checking if my source code for is susceptible to short-circuit evaluation.I don't need answers, I just need corrections. The source code is to check the integer parts o ...

How to solve this question by using r languageyou can

How to solve this question by using R Language? You can attach the Boston data set in the MASS package. library(MASS) For the Boston data set, we are interested in predicting whether a given suburb has a crime rate above ...

Question suppose users share a 2 mbps link also suppose

Question : Suppose users share a 2 Mbps link. Also suppose each user transmits continuously at 1 Mbps when transmitting, but each user transmits only 20 percent of the time. When a circuit switching is used, how many use ...

Question what is stuxnet and what are its real-world

Question : What is Stuxnet and what are its real-world implications? Should your national government be concerned about the potential of a Stuxnet-like attack? Why or why not.

Question why are the error terms in cross-sectional data

Question: Why are the error terms in cross-sectional data unlikely to be serially correlated? Can you give an example in which serial correlation could be present in a cross-sectional dataset? The response must be typed, ...

Describe an ethical conundrum found in a magazine or

Describe an ethical conundrum found in a magazine or newspaper article, and please give your own thoughts. Give good citations, of course.

Question based upon your company profile install and

Question: Based upon your company profile, install and configure Windows Server within the virtual environment. 1. Ensure that the server name is appropriate for your corporation. 2. Create a complex password for the Adm ...

Suppose you had the following backup plan full backups on

Suppose you had the following backup plan: Full backups on the first Sunday of every month, differential backups on the other Sundays of the month, and incremental backups M-F. Suppose something bad happened on April 26t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As